Rules in the workplace. Without them we’d have anarchy. Or would we? According to an article by Dr Travis Bradbury in the Huffington Post most companies fall into the trap of instigating morale sapping rules for every employee based upon the inconsiderate actions of a small minority of transgressors. Hardly seems fair does it? Anyway, in this article, Dr B has outlined nine dumb directives and I have featured my top six… 1. Banning use of social platforms – now I think we would all accept the need to restrict access to some of the more (shall we say) ‘unsavoury’ sites available on the internet but why do some companies insist upon stopping access to the likes of LinkedIn, Facebook and Snap? The commonly held belief is that social media stifles efficiency but there is a counter-argument that these platforms are incredibly useful tools in the work environment – for example scoping someones profile whilst checking them out …
Read More »Tag Archives: Computer networking
Digital Forensics for network, internet, and cloud computing
The modern computer environment has moved past the local data center with a single entry and exit point to a global network comprising many data centers and hundreds of entry and exit points. This business and service migration to remote data centers, where computing and storage are rented from a larger company, is referred to as cloud computing. Companies and people have realized great benefits that result from the use of cloud computing systems – not only in terms of productivity, but also in access to high-speed systems for managing very large data sets in ways that would be financially impossible for some small and midsized companies. Larger companies have also realized the benefits of cheap utility cloud computing as these companies migrate critical database ,transactional processing systems, and software packages to a rented space in a data center that can be anywhere in the world. This migration also has …
Read More »TCP/IP Tutorial and Technical Overview
The TCP/IP protocol suite has become a staple of today’s international society and global economy. Continually evolving standards provide a wide and flexible foundation on which an entire infrastructure of applications are built. Through these we can seek entertainment, conduct business, make financial transactions, deliver services, and much, much more. However, because TCP/IP continues to develop and grow in order to meet the changing needs of our communities, it might sometimes be hard to keep track of new functionality or identify new possibilities. For this reason, the TCP/IP Tutorial and Technical Overview provides not only an introduction to the TCP/IP protocol suite, but also serves as a reference for advanced users seeking to keep their TCP/IP skills aligned with current standards. It is our hope that both the novice and the expert will find useful information in this publication. The Transmission Control Protocol/Internet Protocol (TCP/IP) suite has become the industry-standard …
Read More »How to Cheat at Securing Your Network
Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and distils it into concise recommendations and instructions, using real-world, step-by-step instruction. The latest addition to the bestselling “How to Cheat…” series of IT handbooks, this book clearly identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, email threats, storage devices, and web applications. Solutions are provided for each type of threat, with emphasis on intrusion detection, prevention, and disaster recovery. General Security Concepts: Access Control, Authentication, and Auditing See how AAA is made up of three distinct but interdependent parts: access control, authentication, and auditing. General Security Concepts: Attacks …
Read More »